and Security Technologies

Results: 1110



#Item
311Password / Challenge-response authentication / Diffie–Hellman key exchange / Public-key cryptography / Password Authenticated Key Exchange by Juggling / Zero-knowledge password proof / Cryptographic protocols / Cryptography / Password-authenticated key agreement

Password-Authenticated Multi-Party Key Exchange with Different Passwords Jeong Ok Kwon† , Ik Rae Jeong§ , Kouichi Sakurai‡ , and Dong Hoon Lee† † Center for Information Security Technologies (CIST), Korea Unive

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-25 07:03:53
312Climate change policy / Environment / Climate change / American Clean Energy and Security Act / Carbon Pollution Reduction Scheme / Technology / Sustainable energy / Energy development

What if Australia says Yes to making big polluters pay for what they pump into our skies? Then we could reduce carbon pollution and invest in new, cleaner technologies. And that means new industries and more

Add to Reading List

Source URL: dev.nuw.org.au

Language: English - Date: 2012-12-10 18:47:11
313Environment / Sustainable energy / Renewable energy / Energy policy of the European Union / Energy conservation / International Energy Agency / Office of Energy Efficiency and Renewable Energy / Energy security / Energy policy of the United Kingdom / Energy economics / Energy / Technology

Energy Research, Development and Demonstration in Ireland 2007 AND 2008 INVENTORIES REPORT “Developing and deploying low-carbon technologies will require an integrated policy framework. Many of the most

Add to Reading List

Source URL: www.seai.ie

Language: English - Date: 2015-01-08 04:55:42
314Videotelephony / National Cyber Security Alliance / IronPort / Network performance / Network security / Cisco Career Certifications / Computing / Cisco Systems / Deep packet inspection

Internet filtering and censorship proposals Technical parameters Stephen Gillies Security Technologies Business Unit, Cisco Systems

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English
315Computer network security / Hacking / Malware / Crime prevention / Smart grid / Internet privacy / Vulnerability / Computer security / Security / Cyberwarfare

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-13 19:04:48
316Technology / Battelle Memorial Institute / Nuclear technology in the United States / Manhattan Project / United States Department of Energy / Los Alamos National Security / Bechtel / BWX Technologies / Babcock & Wilcox / Science and technology in the United States / United States / United States Department of Energy National Laboratories

DOE Site Contracts / contractors Site Contractor Contract Companies

Add to Reading List

Source URL: www.efcog.org

Language: English - Date: 2010-08-19 23:30:31
317Cyberwarfare / Antivirus software / Honeypot / Computing / Malware / Computer virus / Internet privacy / Threat / Client honeypot / Computer network security / Computer security / Spamming

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2013-02-13 05:09:51
318Information / Backup software / Data security / Local area networks / Telecommunications engineering / Backup / Qualified Teacher Status / ISCSI / CLARiiON / Computing / Data management / Data

Managed Storage KEY FEATURES • Based on industry leading technologies and partner solutions

Add to Reading List

Source URL: www.qtsdatacenters.com

Language: English - Date: 2014-03-03 15:58:14
319Cloud computing / Internet privacy / Stuxnet / Privacy / Computer security / SCADA / Technology / Ethics / Computing

SEVENTH FRAMEWORK PROGRAMME Information & Communication Technologies Trustworthy ICT NETWORK OF EXCELLENCE A European Network of Excellence in Managing Threats and

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-04-22 05:00:52
320Videotelephony / Crime prevention / Security engineering / Warning systems / Cisco Systems / Cisco Unified Communications Manager / Unified communications / Closed-circuit television / Physical security / Security / National security / Public safety

Coleman Incident Response System (CIRS) Coleman Technologies, Inc. …to be the world’s best systems engineering company… In a world of growing uncertainty amidst global political unease and unpredictable natural di

Add to Reading List

Source URL: www.athoc.com

Language: English - Date: 2014-11-26 10:43:01
UPDATE